skip to main content
10.1145/3205977.3205982acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques

Published:07 June 2018Publication History

ABSTRACT

Security-sensitive workflows impose constraints on the control-flow and authorization policies that may lead to unsatisfiable instances. In these cases, it is still possible to find "least bad" executions where costs associated to authorization violations are minimized, solving the so-called Multi-Objective Workflow Satisfiability Problem (MO-WSP). The MO-WSP is inspired by the Valued WSP and its generalization, the Bi-Objective WSP, but our work considers quantitative solutions to the WSP without abstracting control-flow constraints. In this paper, we define variations of the MO-WSP and solve them using bounded model checking and optimization modulo theories solving. We validate our solutions on real-world workflows and show their scalability on synthetic instances.

References

  1. M. Abadi. Logic in Access Control (Tutorial Notes). Springer, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Adriansyah, B. van Dongen, and N. Zannone. Controlling break-the-glass through alignment. ASE Science Journal, 2(4):198--212, 2013.Google ScholarGoogle Scholar
  3. A. Armando and S.E. Ponta. Model checking of security-sensitive business processes. In Proc. of FAST, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Basin, S.J. Burri, and G. Karjoth. Optimal workflow-aware authorizations. In Proc. of SACMAT, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Bertino, E. Ferrari, and V. Atluri. The specification and enforcement of authorization constraints in workflow management systems. TISSEC, 2(1):65--104, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Bertolissi, D.R. dos Santos, and S. Ranise. Automated synthesis of run-time monitors to enforce authorization policies in business processes. In Proc. of ASIACCS, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Biere, A. Cimatti, E. Clarke, and Y. Zhu. Symbolic model checking without bdds. In Proc. of TACAS, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. N. Bjørner, A. Phan, and L. Fleckenstein. (ν)z - an optimizing SMT solver. In Proc. of TACAS, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Compagna, D.R. dos Santos, S.E. Ponta, and S. Ranise. Cerberus: Automated synthesis of enforcement mechanisms for security-sensitive business processes. In Proc. of TACAS, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Crampton. A reference monitor for workflow systems with constrained task execution. In Proc. of SACMAT, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Crampton and G. Gutin. Constraint expressions and workflow satisfiability. In Proc. of SACMAT, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Crampton, G. Gutin, and D. Karapetyan. Valued workflow satisfiability problem. In Proc. of SACMAT, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Crampton, G. Gutin, D. Karapetyan, and R. Watrigant. The bi-objective workflow satisfiability problem and workflow resiliency. JCS, 25(1):83--115, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  14. J. Crampton, G. Gutin, and R. Watrigant. On the satisfiability of workflows with release points. In Proc. of SACMAT, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Crampton, G. Gutin, and A. Yeo. On the parameterized complexity of the workflow satisfiability problem. In Proc. of CCS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Desel and W. Reisig. Place or transition petri nets. In Lectures on Petri Nets I: Basic Models, Advances in Petri Nets. Springer, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. The Sage Developers. SageMath, the Sage Mathematics Software System, 2017. http://www.sagemath.org.Google ScholarGoogle Scholar
  18. R.M. Dijkman, M. Dumas, and C. Ouyang. Semantics and analysis of business process models in bpmn. Inf. and Soft. Tech., 50(12):1281 -- 1294, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. D.R. dos Santos and S. Ranise. On run-time enforcement of authorization constraints in security-sensitive business processes. In Proc. of SEFM, 2017.Google ScholarGoogle Scholar
  20. D.R. dos Santos and S. Ranise. A survey on workflow satisfiability, resiliency, and related problems. CoRR, abs/1706.07205, 2017.Google ScholarGoogle Scholar
  21. D.R. dos Santos, S. Ranise, L. Compagna, and S. E. Ponta. Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios. In Proc. of DBSec, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  22. J. Dubrovin, T.A. Junttila, and K. Heljanko. Exploiting step semantics for efficient bounded model checking of asynchronous systems. Sci. Comput. Program., 77(10--11):1095--1121, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. H.B. Enderton. A Mathematical Introduction to Logic. Academic Press, New York-London, 1972.Google ScholarGoogle Scholar
  24. V.K. Garg. Maximal antichain lattice algorithms for distributed computations. In Proc. of ICDCN, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  25. M. Gario and A. Micheli. pysmt: a solver-agnostic library for fast prototyping of smt-based algorithms. In SMT Workshop, 2015.Google ScholarGoogle Scholar
  26. J. Holderer, R. Accorsi, and G. Müller. When four-eyes become too much: a survey on the interplay of authorization constraints and workflow resilience. In Proc. of SAC, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. Karapetyan, A. J. Parkes, G. Gutin, and A. Gagarin. Pattern-based approach to the workflow satisfiability problem with user-independent constraints. CoRR, abs/1604.05636, 2016.Google ScholarGoogle Scholar
  28. M. Leitner and S. Rinderle-Ma. A systematic review on security in process-aware information systems--constitution, challenges, and future directions. Inf. and Soft. Tech., 56(3):273--293, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. J.C. Mace, C. Morisset, and A. Moorsel. Quantitative workflow resiliency. In Proc. of ESORICS, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  30. R.T. Marler and J.S. Arora. Survey of multi-objective optimization methods for engineering. Structural and Multidisciplinary Optimization, 26(6):369--395, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  31. A. Roy, S. Sural, A.K. Majumdar, J. Vaidya, and V. Atluri. Minimizing organizational user requirement while meeting security constraints. ACM Trans. Manage. Inf. Syst., 6(3):12:1--12:25, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. R. Sebastiani and P. Trentin. OptiMathSAT: A Tool for Optimization Modulo Theories. In Proc. of CAV, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  33. W.M.P. van der Aalst, A.H.M. ter Hofstede, B. Kiepuszewski, and A.P. Barros. Workflow patterns. Distributed Parallel Databases, 14(1):5--51, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Q. Wang and N. Li. Satisfiability and resiliency in workflow authorization systems. TISSEC, 13, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. M. Weske. Business Process Management: Concepts, Languages, Architectures. Springer, Secaucus, NJ, USA, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SACMAT '18: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies
        June 2018
        271 pages
        ISBN:9781450356664
        DOI:10.1145/3205977
        • General Chair:
        • Elisa Bertino,
        • Program Chairs:
        • Dan Lin,
        • Jorge Lobo

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 June 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SACMAT '18 Paper Acceptance Rate14of50submissions,28%Overall Acceptance Rate177of597submissions,30%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader